Social engineer reveals effective tricks for real-world intrusions

In this Help Net Security interview, Jayson E. Street, Chief Adversarial Officer at Secure Yeti, discusses intriguing aspects of social engineering and unconventional methods for gathering target information.
Street explores the overlooked threat of physical security and the human tendency to neglect negative outcomes.
One of the most unconventional methods I use when doing research and recon for an engagement, especially the ones that involve me going on-site for a physical compromise, is to use the websites of the architects who did work on their building.
I'll go to their building management website because you will sometimes find blueprints and pictures showing what the inside of their building looks like.
Such detailed disclosure offered insights into how one might circumvent the building's physical security systems.
We all know that social media makes gathering information on your targets extremely easy.
Still, companies need to understand that it's not just social media that can be used against them; it's their partner's, those they've hired, and people they work with that can divulge information that could be detrimental to their cybersecurity and their perimeter security.
My main social engineering trick is just walking into a location like you belong there.
People underestimate how far confidence will get you into a location and how unsuspecting people are when they feel secure.
I've always said the only thing worse than no security is the false sense of security because it is tough to imagine something terrible will happen when you have that false sense of security.
One of the main tricks that I do when I am doing a phishing attack is not to tell them that something positive has happened.
People are very suspicious when they get an e-mail that something good has happened or will happen to them.
We often hear about software vulnerabilities, but physical intrusion is an overlooked threat for many organizations.
One of the key differences between software vulnerabilities and physical intrusions that many organizations often overlook is that software vulnerabilities have very defined and narrow vectors of attack.
The reason is they are limited by the network, the operating system, and the program that is being targeted.
With a physical intrusion, so many factors come into play, like the time of day, the location of the building itself, the security measures in place, and the people entrusted to maintain that security.
Unless we have no choice but to confront the truth that it is occurring, this flaw is very hard to overcome in most people.
While doing most of my engagements on-site, making a physical compromise, I encountered quite a few interesting situations.
Regrettably, many companies tend to focus more on the latest, buzzword-laden threats, rather than investing effort in implementing defensive measures, which, although they may seem mundane and challenging, are often far more effective in safeguarding the organization.
Ultimately, the practicality and effectiveness of these foundational security practices cannot be overstated in ensuring the company's protection.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Mon, 08 Jan 2024 07:13:04 +0000


Cyber News related to Social engineer reveals effective tricks for real-world intrusions

Hacker Conversations: Stephanie 'Snow' Carruthers, Chief People Hacker at IBM X-Force Red - Social engineering is effectively hacking human thought processes. Social engineering is a major factor in the overall process but is not directly part of repurposing electronic systems. A social engineer is usually classified as a hacker, and is ...
7 months ago Securityweek.com
Adobe Real-Time CDP: Personalized Customer Experience - Adobe Experience Cloud Products like Adobe Real-Time CDP are available to assist. A revolutionary solution called Adobe Real-Time Customer Data Platform was created to assist companies in realizing the whole value of their customer data. Adobe ...
10 months ago Hackread.com
Social Engineering: The Art of Human Hacking - Social engineering exploits this vulnerability by manipulating human psychology and emotions to gain unauthorized access to systems and data. Rather than directly breaking cyber defenses, social engineering tactics exploit human vulnerabilities - ...
10 months ago Offsec.com
Social Justice: a global perspective - Today, we commemorate World Day of Social Justice and honor those across the globe who stand for the equitable access to opportunities within societies where individuals' rights are recognized and protected. I have the distinct honor of leading the ...
8 months ago Feedpress.me
AI and the Evolution of Social Media - A decade ago, social media was celebrated for sparking democratic uprisings in the Arab world and beyond. In a 2022 survey, Americans blamed social media for the coarsening of our political discourse, the spread of misinformation, and the increase in ...
7 months ago Securityboulevard.com
Social Engineering Attacks: Tactics and Prevention - Social engineering attacks have become a significant concern in today's digital landscape, posing serious risks to the security and sensitive information of individuals and organizations. By comprehending these tactics and implementing preventive ...
9 months ago Securityzap.com
Social engineer reveals effective tricks for real-world intrusions - In this Help Net Security interview, Jayson E. Street, Chief Adversarial Officer at Secure Yeti, discusses intriguing aspects of social engineering and unconventional methods for gathering target information. Street explores the overlooked threat of ...
9 months ago Helpnetsecurity.com
Cybersecurity Curriculum Development Tips - In this article, we will explore essential tips for developing a comprehensive and up-to-date cybersecurity curriculum. By staying abreast of the latest industry trends, educational program developers can ensure that their curriculum remains relevant ...
10 months ago Securityzap.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
11 months ago Esecurityplanet.com
Exploring How Virtual Worlds Change Social Media Experiences - Humans have always desired to connect with one another, from the days of sending letters to the current age of social media. As technology has advanced, so have the ways we communicate. We are now seeing a shift in the way tech giants are embracing ...
1 year ago Hackread.com
Combatting Social Engineering - One popular cyber-attack method known as social engineering leverages human psychology to gather information and perform attacks instead. Social engineering is the psychological manipulation of people into performing actions or divulging confidential ...
10 months ago Cyberdefensemagazine.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
1 month ago Helpnetsecurity.com
While we fire the boss, can you lock him out of the network? The Register - On Call Welcome once more, dear reader, to On Call, The Register's weekly reader-contributed column detailing the delights and dangers of working in tech support. Their evidence for the allegation was temp files that showed the engineer's account had ...
9 months ago Go.theregister.com
Speaking Freely: Lynn Hamadallah - There's been a lot of censorship for example on social media, which I've experienced myself when posting content in support of Palestine. The argument put forward was that those cases represented instances of free speech rather than hate speech. You ...
6 months ago Eff.org
Best of 2023: Why is everyone getting hacked on Facebook? - Importantly, phishing relies on the victim trusting the scammer and taking an action - like clicking a link or sending bank account information - in order for the scammer to get what they want. It's not your imagination - social media scams really ...
10 months ago Securityboulevard.com
Protecting Your Digital Space: A Guide on How to Stay Cyber Safe on Social Media - In the age of digital inter-connectedness, social media has become an integral part of our daily lives, enabling us to connect, share, and communicate globally. As cyber threats continue to evolve, it's crucial to adopt proactive measures to ensure ...
9 months ago Cybersecurity-insiders.com
DP World confirms data stolen in cyberattack, no ransomware used - International logistics giant DP World has confirmed that data was stolen during a cyber attack that disrupted its operations in Australia earlier this month. The company says no ransomware payloads or encryption was used in the attack. On November ...
11 months ago Bleepingcomputer.com
Exploring the SIEM Environment Identifying and Overcoming Vendor Tricks - Are you fed up with the never-ending games and deceptive tactics used by security information and event management vendors? It's time to take control and make informed decisions. That's why we have decided to launch a series of blog posts to help ...
1 year ago Exabeam.com
Why Cybersecurity Businesses Need a Real-Time Collaboration Tool - When the Cybercrime in a Pandemic World study was released in late 2021, the report noted that cybersecurity threats had risen 81% since the coronavirus raised its ugly head. It was a time of restrictive lockdowns, stay-at-home orders, and mask ...
1 year ago Hackread.com
Cybersecurity Workshops for Students - Cybersecurity workshops for students serve as an effective means to educate and empower the younger generation in protecting their digital assets. With proper planning and organization, cybersecurity workshops enable students to navigate the digital ...
10 months ago Securityzap.com
Week in review: GitLab account takeover flaw, attackers exploiting Ivanti Connect Secure zero-days - Social engineer reveals effective tricks for real-world intrusionsIn this Help Net Security interview, Jayson E. Street, Chief Adversarial Officer at Secure Yeti, discusses intriguing aspects of social engineering and unconventional methods for ...
9 months ago Helpnetsecurity.com
Augmented Reality Vs. Virtual Reality - In the realm where Augmented Reality and Virtual Reality converge, a high-stakes game unfolds as these two key players battle for dominance. Augmented Reality and Virtual Reality are two distinct immersive technologies that are often confused. ...
7 months ago Securityzap.com
Google Chrome To Roll Out Real-Time Phishing Protection - Google Chrome has been protecting users from malicious websites and files with Safe Browsing, which maintains a locally-stored list updated every 30-60 minutes. To address it, Chrome is introducing a new version of Safe Browsing that provides ...
7 months ago Cybersecuritynews.com
Kids Online Safety Shouldn't Require Massive Online Censorship and Surveillance: 2023 Year in Review - Many of these bills would run roughshod over the rights of young people and adults in the process. There's also good news: so far, none of these dangerous bills have been passed at the federal level, or signed into law. That's thanks to a large ...
10 months ago Eff.org
Lawmakers: Ban TikTok to Stop Election Misinformation! Same Lawmakers: Restrict How Government Addresses Election Misinformation! - In a case being heard Monday at the Supreme Court, 45 Washington lawmakers have argued that government communications with social media sites about possible election interference misinformation are illegal. Just this week the vast majority of those ...
7 months ago Eff.org

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)